Sei sulla pagina 1di 4

FORENSIC ASSIGNMENT

ON
CYBER CRIME AND SECURITY
Defining Cyber Crime -
Computer crime or cybercrime, is any crime that involves a computer and a network.
Thecomputer may have been used in the commission of a crime, or it may be the target.
OR
Dr. Debarati Halder and Dr. K. Jaishankar define Cybercrimes as: "Offences that are
committed against individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or cause physical or mental harm, or loss,
to the victim directly or indirectly, using modern telecommunication networks such as
Internet (Chat rooms, emails, notice boards and groups) and mobile phones
(SMS/MMS)"

History of Cyber Crime -

The illegal activity of cyber crime started just after the discovery of telephone and
telegraph. The given below is the list of the different cyber attacks :-
1834 - The world’s first cyberattack occured, in which a pair of thieves hacked the
French Telegraph System and steal financial market information.
1969 - The first virus attack is thought to be occured in this year in which an
anonymous person installed a program on a computer of the University of
Washington Computer Center. The inconspicuous program makes copies of itself
(breeding like a rabbit) until the computer overloads and stops working. The virus
wass named as Rabbit Virus.
1976 - The first spam email took place in this year when it was sent out over the
ARPANT.
There are many more cyber attacks that took place after these events which leads to the
formulation of laws for the cyber crime and different cyber security systems for the
protection of data.

Types of Cyber Crime -


Hacking :- It is a cyber crime in which there is an illegal intrusion into a
computer system and/or network . It is also known as Cracking. Government
websites are the hot target of the hackers
Phishing :- It is a cybercrime in which a target or targets are contacted by email,
telephone or text message by someone posing as a legitimate institution to lure
individuals into providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.
Denial of service attacks :- This is an act by the criminals who floods the
bandwidth of the victims network or fills his e-mail box with spam mail depriving
him of the service he is entitled to access or provided.
Virus dissemination :- It is an illegal activity in which a malicious software is
attached to the other software that destroys the system of the victim. They disrupt
the computer operation and affect the data store by modifying or deleting it.
Computer vandalism : Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. There are program that attach
themselves to a file and then circulate.
Cyber terrorism :- Terrorist attacks on the internet is by distributed denial of
service attacks, hate websites and hate e-mails , attacks on service network etc.
Software piracy :- Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of products intended to pass for
the original.
Case Study -
BioStar 2 Leak Exposes 23 GB Data, 1Million Fingerprints

Date discovered :- 5th August 2019


Date of Action :-13th August 2019
BioStar 2 is a web-based biometric security smart lock platform. A centralized
application, it allows admins to control access to secure areas of facilities, manage user
permissions, integrate with 3rd party security apps, and record activity logs. As part of
the biometric software, BioStar 2 uses facial recognition and fingerprinting technology
to identify users.
Noam Rotem and Ran Locar, both Internet privacy researchers, first detected the leak on
August 5 while scanning ports as part of a Web-mapping project. Their team hunts for
familiar IP blocks and uses them to find holes in a company's Web system. When these
holes are found, the researchers then look for vulnerabilities that could lead to a data
breach. During this process, the team found large chunks of BioStar 2's database
unsecured and unencrypted. They could access more than 27.8 million records and a
total of 23 GB of data, including more than 1 million fingerprints; facial recognition data
and user images; access to client admin panels, dashboards, back-end controls, and
permissions; unencrypted usernames and passwords, records of entry and exit to secure
areas; and employee records. , giving hackers access to user accounts and permissions at
facilities using BioStar 2. Malicious agents could use this to hack into secure facilities
and manipulate their security protocols for criminal activities.
As it was not a security breach by any criminal and data was not used for any of the
illegal activity the reseachers informed the BioStar 2 the breach was closed and the data
was encrypted by them to prevent any other security breach.
Cyber Security -
It may be defined as the process to mitigate the security threats in order to protect
reputation loss, business loss or monetary loss of any organization. The term Cyber
security clearly sought that it’s a kind of security that is offered to the system that
numerous users can not access using the internet or intranet. It’s a continuous process
and the system administrator has to keep things updated in order to keep the risk low.
Technology and Tools Used in Cyber Security -
The tools and techniques employed to tackle cyber security concerns are:
Authentication :- This fundamental cyber security technique intends to verify the
identity of user based on the credentials stored in the security domain of the
system. The most common mode of governance is password technology, Sim
Card Unique Id etc.
Encryption :- Encryption renders data undecipherable without application of a
proper key to unlock the same. To combat an encryption, one would be required to
undertake solving complicated mathematical problems like factoring large primes
that would consume astronomical amount of computing resources and time.
Digital signatures :- Digital signatures can be erected out of the same
mathematical algorithms that are employed in encryption. A user is free to test that
he possesses a private key by getting some information encoded with it.
Anti-virus :- Anti-virus software carries out two functionsthat is it prevents the
installation of virus in a system and scans the systems for viruses that are already
installed.
Firewall :- Firewalls effectively hinders any attempt of unauthorized access to a
computer when it is connected on the internet by hackers directly or via other
network connections.
Advantages of Cyber Security -
There are numerous of benefits of cyber security in which some of them are listed below :-
Securing organization - Cyber security helps in securing organizations network
from external attacks. It makes sure that the organization should feel safe about its
important data.
Safeguarding sensitive data - It helps in securing the highly confidential data
like patients data, student data, sales data has to be secure from unauthorized
access so that it couldn’t be misused.
Hamper unauthorized access - It helps us to protect the system from being
accessed by someone who is not authorized to access it. The data is kept highly
secure and could only be fetched with authenticated users.
Cyber Laws in India -
To prevent the cyber crimes and security breaches in India, The Information Technology
Act, 2000, was thus passed as the Act No.21 of 2000, got President assent on 9 June and
was made effective from 17 October 2000. The Act essentially deals with the following
issues:
Legal Recognition of Electronic Documents
Legal Recognition of Digital Signatures
Offenses and Contraventions
Justice Dispensation Systems for cyber crimes

References -
Digital Foernsics – By Dr. Jeetendra Pande, Dr. Ajay Prasad,
ISBN: 978-93-84813-94-9
Computer Forensics and Cyber Crime An Introduction – By Marjie T.
Britz
https://www.herjavecgroup.com/history-of-cybercrime/
https://www.phishing.org/what-is-phishing
https://www.cybercrimechambers.com/blog-bot-virus-dissemination--
124.php
https://www.slideshare.net/aemankhan/cybercrimeppt-27376284
https://www.educba.com/what-is-cyber-security/
http://www.crossdomainsolutions.com/cyber-security/tools-techniques/
https://www.vpnmentor.com/blog/report-biostar2-leak/
http://www.iibf.org.in/documents/Cyber-Laws-chapter-in-Legal-
Aspects-Book.pdf

SUBMITTED BY – Navodita Seth


ZO – 228 , BMS 2nd Year

Potrebbero piacerti anche